## Mary willis is the advertising manager for bargain shoe store.

Resources: Generally Accepted Accounting Principles (GAAP), U.S. Securities and Exchange Commission (SEC)

Tutorial help on Excel® and Word functions can be found on the Microsoft® Office website. There are also additional tutorials via the web offering support for Office products.

Scenario: Mary Willis is the advertising manager for Bargain Shoe Store. She is currently working on a major promotional campaign. Her ideas include the installation of a new lighting system and increased display space that will add \$24,000 in fixed costs to the \$270,000 in fixed costs currently spent. In addition, Mary is proposing a 5% price decrease (\$40 to \$38) will produce a 20% increase in sales volume (20,000 to 24,000). Variable costs will remain at \$24 per pair of shoes. Management is impressed with Mary’s ideas but concerned about the effects these changes will have on the break-even point and the margin of safety.

Complete the following:

• Compute the current break-even point in units, and compare it to the break-even point in units if Mary’s ideas are used.
• Compute the margin of safety ratio for current operations and after Mary’s changes are introduced (Round to nearest full percent).
• Prepare a CVP (Cost-Volume-Profit) income statement for current operations and after Mary’s changes are introduced.

Prepare a 1000-word informal memo to management addressing Mary’s suggested changes.

• Explain whether Mary’s changes should be adopted. Why or why not? Analyze the above information (three bullet points above) and use this information to support your suggestion.

Complete calculations/computations using Excel®.

Format your assignment consistent with APA guidelines.

## Tax homework | Operations Management homework help

Lou is an attorney and owns his law firm, which is operating as an S corporation. His W-2 information and Schedule K-1 from his law firm are as follows:Â Â Wages (box 1)=\$114,800.50Federal W/H (box 2)=\$15,000.14Social security wages (box 3)=\$114,800.50Social security W/H (box 4)=\$7,117.63Medicare wages (box 5)=\$114,800.50Medicare W/H (box 6)=\$1,664.61Â
Schedule K-1 from the law offices of Lou Girardi – Attorney at Law ID # 12-3456789 100% Owner Material participation:Line 1 Â Â = Â \$22,582.00 (ordinary business income)
Line 11 = Â \$22,582.00 (Â§ 179 deduction)Â
Joann is a full-time lecturer at Arizona State University. Her W-2 information from ASU is as follows:Â Wages (box 1)=\$65,000.00Federal W/H (box 2)=\$9,950.25Social security wages (box 3)=\$65,000.00Social security W/H (box 4)=\$4,030.00Medicare wages (box 5)=\$65,000.00Medicare W/H (box 6)=\$942.50

Â

Â The following are other income and expenses they received and incurred during the year:Â  Â IncomeÂ Â Dividend (qualified)\$666InterestÂ 765ExpensesÂ Â Real estate taxesÂ 7,836State sales taxÂ 1,629Mortgage interestÂ 32,562Charitable contributionÂ 2,598Â Â  Prepare the Girardisâ€™ federal tax return for 2016. Use Form 1040, and Schedules A, B, and E. Assume that the Girardis do not qualify for any credits (although they may). For any missing information, make reasonable assumptions. The taxpayers had qualifying health care coverage at all times during the tax year. (Assume no AMT although it may apply; Form 6251 or the AMT calculation is not required.) (List the names of the taxpayers in the order inÂ which theyÂ appear in the problem. Do not round intermediate computations. Input all the values as positive numbers.)

Â

Lou is an attorney and owns his law firm, which is operating as an S corporation. His W-2 information and Schedule K-1 from his law firm are as follows:Â Â Wages (box 1)=\$114,800.50Federal W/H (box 2)=\$15,000.14Social security wages (box 3)=\$114,800.50Social security W/H (box 4)=\$7,117.63Medicare wages (box 5)=\$114,800.50Medicare W/H (box 6)=\$1,664.61Â
Schedule K-1 from the law offices of Lou Girardi – Attorney at Law ID # 12-3456789 100% Owner Material participation:Line 1 Â Â = Â \$22,582.00 (ordinary business income)
Line 11 = Â \$22,582.00 (Â§ 179 deduction)Â
Joann is a full-time lecturer at Arizona State University. Her W-2 information from ASU is as follows:Â Wages (box 1)=\$65,000.00Federal W/H (box 2)=\$9,950.25Social security wages (box 3)=\$65,000.00Social security W/H (box 4)=\$4,030.00Medicare wages (box 5)=\$65,000.00Medicare W/H (box 6)=\$942.50

Â

Â The following are other income and expenses they received and incurred during the year:Â  Â IncomeÂ Â Dividend (qualified)\$666InterestÂ 765ExpensesÂ Â Real estate taxesÂ 7,836State sales taxÂ 1,629Mortgage interestÂ 32,562Charitable contributionÂ 2,598Â Â  Prepare the Girardisâ€™ federal tax return for 2016. Use Form 1040, and Schedules A, B, and E. Assume that the Girardis do not qualify for any credits (although they may). For any missing information, make reasonable assumptions. The taxpayers had qualifying health care coverage at all times during the tax year. (Assume no AMT although it may apply; Form 6251 or the AMT calculation is not required.) (List the names of the taxpayers in the order inÂ which theyÂ appear in the problem. Do not round intermediate computations. Input all the values as positive numbers.)

Â

Use the appropriate Tax Tables or Tax Rate Schedules.

## Infa 620 midterm network | Computer Science homework help

INFA 620 Midterm Network

Part 1: Multiple Choice Questions.

Note Unless specified otherwise all multiple choice questions have only one correct answer. Each question is worth 4 points.

General questions

1. Which of the following are not directly addressed when implementing network security? (Choose two.)

A) Personal safety B) Freedom of information initiatives C) Evolving business requirements D) Protection of data E) Physical plant security

2. Select from the following the best definition of security risk analysis:

A) Risk analysis looks at the probability that a vulnerability exists in your system. B) Risk analysis looks at the probability that your security measures won’t stop a hacker breaking in to your system. C) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them. D) Risk analysis looks at the probability that a hacker may break in to your system. E) Risk analysis looks at the consequences of being connected to the Internet.

3. Which of the following is considered the first line of defense against human behavior?

A) Policies B) Cryptography C) Physical security D) Business continuity planning

4. Which of the following is considered a flaw, loophole, oversight, or error that makes the organization susceptible to attack or damage?

A) Risk B) Vulnerability C) Exposure D) Threat

Cryptography Fundamentals. Public-Key Cryptography and Message Authentication

5. The two methods of encrypting data are

A) Substitution and transposition B) Block and stream C) Symmetric and asymmetric D) DES and AES

6. The only cipher system said to be unbreakable by brute force is

A) AES B) DES C) One-time pad D) Triple DES

7. When a user needs to provide message integrity, what options may be the best?

A) Send a digital signature of the message to the recipient B) Encrypt the message with a symmetric algorithm and send it C) Create a checksum, append it to the message, encrypt the message, then send it to the recipient D) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

Key Distribution and User Authentication

8. Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other’s public key. A wants to send B some message M. A selects random DES key K and send B the following two messages: — Epub(B)( K, Sigprv(A)(K)) — EK(M) “E” means encryption and “Sig” means digital signature. Which of the following statement(s) is true? (Choose two.)

(A) Only B can decipher the contents of the message M. (B) B is certain that the message M is from A. (C) B can prove to a third party that the message M arrived from A. (D) B cannot decipher the contents of the message M. (E) B is not certain that the message M is from A.

9. Suppose a user is authenticated based on an ID and password that are supplied by the transmitter in plaintext. Does it make any difference if the password and ID are encrypted?

(A) If the system authenticates users based on IDs and passwords that are transmitted in plaintext, the system is very insecure. (B) If the password and ID are encrypted, the system is definitely more secure than in the plaintext case. (C) The intruder can still record the encrypted ID and the corresponding encrypted password. By replaying these, the intruder can gain access to the system. (D) None of the above is correct.

10. You have an issue in your company with users claiming they did not receive e-mail messages, while other users claim they were sent. What PKI component will help you to prove the dates and times of messages sent on the network?

A) Non-Repudiation B) Encryption C) Encapsulation D) Integrity E) Confidentiality

11. A certificate authority provides what benefits to a user?

A) Protection of public keys of all users B) History of symmetric keys C) Proof of nonrepudiation of origin D) Validation that a public key is associated with a particular user

Network Vulnerabilities, Attacks and Countermeasures

12. All of the following are types of cyber attack, except:

A) A nuclear explosion that knocks out all electronic devices. B) Spam. C) Malicious software designed to interrupt services. D) A flood of computers hacked to disrupt other computers.

13. If you notice that the number of existing half-open sessions is beginning to rise, what could this indicate? (Select all that apply)

A) Answers B) Man in the Middle attack C) Serial Scan D) IP Spoofing E) Port Scan F) DoS attack

14. DoS attacks exist for which part of the OSI protocol stack?

A) Application and Presentation B) Session and Transport C) Network and Data Link D) All of the above

15. Consider using DHCP. What are the major security concerns? Indicate the two best answers from the following list.

A) The network is vulnerable to man-in-the-middle attacks. B) Anyone hooking up to the network can automatically receive a network address. C) Clients might be redirected to an incorrect DNS address. D) There are no security concerns with using DHCP

1. Consider a public key encryption. Ann wants to send Bill a message. Let Annpriv and Annpub be Ann’s private and public keys respectively. The same for Bill (Billpriv and Billpub).

(a) If Ann sends a message to Bill, what encryption should Ann use so that only Bill can decrypt the message (secrecy)? (4 points)

(b) Can Ann encrypt the message so that anyone who receives the message is assured that the message only came from Ann (authenticity)? (4 points)

(c) Is it possible for Ann to devise a method that will allow for both secrecy and authenticity for her message? Please justify your answer. (4 points)

2. Alan and Bill agree (through a public exchange) on using the Diffie-Hellman algorithm to create a common secret key. They also agree on two public numbers: q (large prime number), a (generator mod q): q = 7, a = 2

Alan generates a random CA =6, use CA to calculate DA and then sends DA to Bill. Alan has also received a value DB from Bill.

Bill generates a random CB =7, use CB to calculate DB and then sends DB to Alan. Bill has also received the value DA sent from Alan as mentioned above.

(a) What is DA? (i.e. DA =?) (4 points) (b) What is DB? (i.e. DB =?) (4 points) (c) What is the common secret key between Alan and Bill? (4 points) (Note you must show calculation procedures to obtain full points for each question)

(b)

3. Consider the following hashing algorithm. A binary block of length M is divided into subblocks of length 128 bits, and the last block is padded with zeros to a length of 128. The hash consists of the XOR of the resulting 128-bit vectors. Is this algorithm appropriate for encryption? Explain. (16 points)

## Week 3 Individual: International Plastics, Inc. Network Description

Resources: International Plastics, Inc. documents: see zipped resource file.

Develop a network drawing for International Plastics, Inc. using Microsoft® Visio®, Word, or PowerPoint®.

In addition to your network drawing, prepare a 260- to 350-word explanation of your network drawing and recommended improvements. Include the following information:

• Explanation of the drawing
• The risks to the current      network
• The recommended improvements      for the current International Plastics’ voice, video, and data global      networks based on the risks that were identified

Ensure that references are cited and that the paper follows APA formatting guidelines.

Submit your assignment to the Assignment Files tab.

## Operations strategy at byd of china

Read the Operations Strategy at BYD of China, Electrifying the World’s Automotive Market case study in your course text (p. 410). After reviewing the information in this case study and the Learning Resources for this week, complete the following:

#### By Day 7

Submit and post to the Discussion Board a 250- to 350-word response to the following questions:

• What were BYD’s operations objectives and how did these change?
• What key operations decisions helped BYD develop a competitive advantage over other manufacturers?
• Briefly describe BYD supply chain. What innovative ideas did BYD integrate into its supply chain model to reduce costs and improve efficiency?

## Group case study byd of china

For your Group Discussion this week, do the following:

#### By Day 3

Post a 250- to 350-word response that addresses the following:

• What are the internal strengths and weaknesses of BYD along with the external opportunities and threats (SWOT analysis)?
• Given a business strategy of being the word leader in manufacturing electric cars with innovative technology, what operations and supply chain strategy do you think BYD should pursue? Identify what operations and supply chain should do to help BYD compete including a mission, objectives, distinctive competence and key decisions.

Please also include textbook as reference

## Case assignment 4-5 pages apa format double spaced | BUSI 472 – Organizational Ethics | Liberty University

The case is Case 9, “Enron: Questionable Accounting Leads to Collapse.” The paper must have at least 3 Level 1 headings that correspond to the following case points:

· How did the corporate culture of Enron contribute to its bankruptcy?

· In what ways did Enron’s bankers, auditors, and attorneys contribute to Enron’s demise?

· What role did the company’s Chief Financial Officer play in creating the problems that led to Enron’s financial problems?

## Mgmt of production and oprtns#7 discussion

For a “Management of Production and Operations” class

I need 250-300 words (1 page).

The detailed instructions are in the attached file.

I have also included a copy of the textbook, in case you need it. Chapters 13, and 14.

APA STYLE

ORIGINAL WORK ONLY

## Critical essay outline | ENG 121 English Composition I | Ashford University

• Determine what is most important in the essay you selected and summarize the main argument.
• Convert brainstorming ideas into a workable outline as part of the writing process.
• Use appropriate academic writing tone, style, correct grammar, spelling, and sentence mechanics.
• Apply structural components of outlining format to continue essay development.

The Critical Essay Outline

***Reference:

http://web.a.ebscohost.com.proxy-library.ashford.edu/ehost/detail/detail?vid=0&sid=ba281e2d-ccf5-44fe-bfe9-cbb2ec6a835c%40sessionmgr4007&bdata=JkF1dGhUeXBlPWlwLGNwaWQmY3VzdGlkPXM4ODU2ODk3JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=wapo.8ffe6f78-9509-11e4-927a-4fa2638cd1b0&db=n5h

The link above is the article I chose. It is a private page and I don’t have a password to log-in so I took screenshots of the article so that you could have it for this assignment.

This assignment needs to be completed using the outline.

## W6 case study question from pages 504-505 and 537-539 (assignment | Business Intelligence

Note: – Must require——–

1- APA format (Times New Roman, size 12 and 2 space)

2- MS Visio diagram OR MS Word Smart Art

3- Minimum 3 or more References including Sharda mentioned below.

W6: Case Studies- textbook from Pages 504-505 and 537-539

Carefully review and read both case studies found in your textbook from Pages 504-505 and 537-539

Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics:

Systems for decision support (10th ed.). Boston: Pearson.

Digital: ISBN-13: 978-0-13-340193-6 or Print: ISBN-13: 978-0-13-305090-5

When developing illustrations to support a process or operation of steps, Microsoft Word has a tool known as “Smart Art” which is ideal for the development of these types of illustrations or diagrams.  To get acquainted with this tool, everyone can visit www.youtube.com using a keyword search “Microsoft Word Smart Art Tutorials” to find many video demonstrations in using this tool.

Minimum Paper Expectations

· Page Requirements:  The overall paper supporting both cases will include a minimum of “4” pages of written content.

· Research Requirements:  The overall paper will be supported with a minimum of “3” academic sources of research and one of the sources can be the textbook.

· Application Technology:  Microsoft Word will be used to prepare this paper.

· Professional Format: APA will be used to prepare the professional layout and documentation of research.

· Important Note:  Do not fall below minimum page and research requirements.

Questions from the text Book which we need to elaborate in our case study

QUESTIONS FOR THE END-OF-CHAPTER

APPLICATION CASE 1

Introduction —

1. What is the key difference between the former tax collection system and the new system?

2. List at least three benefits that were derived from implementing the new system.

3. In what ways do analytics and optimization support the generation of an efficient tax collection system?

4. Why was tax collection a target for decreasing the budget deficit in the State of New York?

QUESTIONS FOR THE END-OF-CHAPTER

APPLICATION CASE 2

Introduction–

1. Why should digital forensics information be shared among law enforcement communities?

2. What does egocentric theory suggest about knowledge sharing?